Internet Security

Book description

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.

· Shield data from both the internal and external intruder
· Discover products that can detect and prevent these break-ins
· Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
· Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Foreword
  7. Acknowledgments
  8. Introduction
  9. Chapter 1: The Internet and Security
    1. 1.1 The history of the Internet
    2. 1.2 TCP/IP: the nails of the Internet
  10. Chapter 2: The Security Review Process
    1. 2.1 Introduction
    2. 2.2 Review the state of the business
    3. 2.3 Analyze the technology being used
    4. 2.4 Risk analysis
    5. 2.5 Plans and policies
    6. 2.6 Implementation
  11. Chapter 3: Cryptography
    1. 3.1 The history
    2. 3.2 Key types
    3. 3.3 RSA: public and private key
    4. 3.4 PKI and business solutions
  12. Chapter 4: Secure Networks
    1. 4.1 TCP/IP and OSI
    2. 4.2 Denial-of-service attacks
    3. 4.3 Virtual private networks
    4. 4.4 Secure sockets layer
  13. Chapter 5: Protecting Your Intranet from the Extranet and Internet
    1. 5.1 So many choices!
    2. 5.2 Firewall product functional summaries
    3. 5.3 Firewall buyer’s assessment form
    4. 5.4 Firewall vendors: Picking the products that are right for you
    5. 5.5 SSL network appliance overview4
    6. 5.6 Secure access—SSL based extranet appliances5
    7. 5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications6
  14. Chapter 6: Authentication and Authorization
    1. 6.1 The basics
    2. 6.2 Authentication
    3. 6.3 Authorization
    4. 6.4 Smart cards
  15. Chapter 7: E-Commerce: Public Key Infrastructure
    1. 7.1 PKI and you
    2. 7.2 X.509
    3. 7.3 Certificate authority
    4. 7.4 Certification practice statement
    5. 7.5 Certificate revocation list
    6. 7.6 Key recovery
    7. 7.7 Lightweight directory access protocol
    8. 7.8 Public key cryptography standards
    9. 7.9 Public key infrastructure (X.509) standards
  16. Chapter 8: Messaging Security
    1. 8.1 Safe communication: Messaging
    2. 8.2 Junk mail
    3. 8.3 Keep it running
  17. Chapter 9: What Are We Doing Here?
    1. 9.1 Risk analysis
    2. 9.2 The threats
    3. 9.3 Technology security review
    4. 9.4 Control directory and environment risk table
    5. 9.5 Competitive asset
  18. Chapter 10: Disaster Recovery
    1. 10.1 Introduction
    2. 10.2 Incident handling requirements
    3. 10.3 Incident handling processes
    4. 10.4 Incident handling procedures
    5. 10.5 Incident handling team implementation
    6. 10.6 Disaster recovery and business continuity
  19. Appendix 1: Security Tools
  20. Appendix 2: The CERT Report
  21. Glossary
  22. References
  23. Index

Product information

  • Title: Internet Security
  • Author(s): Tim Speed, Juanita Ellis
  • Release date: April 2003
  • Publisher(s): Digital Press
  • ISBN: 9780080509075